ARTICLES

All About Global Internet Shutdown

Starting from today, Internet users across globe could experience network failures in next 48 hours. Read on to know more about the global Internet...

Why WhatsApp Payment Roll Out is Delayed

There have been some recent developments in the WhatsApp Payment system in India. Read on to know more about the WhatsApp building systems to...

How to Deal With Your Google+ Account

With the data breach of Google+, several users are skeptical about deleting their account. Read on to know more about how to delete your...

Why Google Didn’t Disclose Google+ Data Breach

According to a report, Google exposed private data of large number of users in its Google+ social network and opted not to disclose the...

NEWS

Millions of Xiongmai surveillance devices discovered vulnerable to hackers

Source: Cyware | By Sophia Brown • The devices contain multiple vulnerabilities that could allow attackers to remotely access them. • The vulnerabilities can be easily...

Hacker behind 2013 NASA website defacement attacks identified

Source: Cyware | By Sophia Brown Hacker behind 2013 NASA website defacement attacks identified by the Italian police • The suspect claimed to be an important...

Identity Spoofing Hits the Jackpot as the Primary Attack Vector

Identity Spoofing Hits the Jackpot as the Primary Attack Vector on Gaming and Gambling Sites, Reveals New ThreatMetrix Cybercrime Report ThreatMetrix, a LexisNexis Risk Solutions...

Hackers hit Sodexo with malware attack

Source: Cyware | By Sophia Brown Hackers hit Sodexo with malware attack that may have compromised users’ personal data • The data likely compromised by the...

INTERVIEWS

Interview of Paul Garvey, Vice President of IBM Security, Asia Pacific

In this interview, Paul Garvey, Vice President of IBM Security, Asia Pacific, explains how IBM is gearing up to meet the security challenges and...

Interview with Alisdair Faulkner, Chief Products Officer, ThreatMetrix, U.S

Alisdair Faulkner, Chief Products Officer, ThreatMetrix, explains how his organisation secures the digital identity of business and government enterprises through digital identity intelligence and...

Interview of Thiagarajan, Director – IT, India & Asia, IMI Critical...

With the growing threat landscape in cyber space, how matured the critical industry sector is in India to protect their business sensitive data? The critical...

Interview with Sharad Sadadekar, CISO, HDFC Life Insurance

With the growing threat landscape in cyber space, how HDFC Life Insurance has been managing to protect their business sensitive data? Financial organisations are entrusted...

Keyur Desai, CIO – ESSAR Ports & Shipping, says that user...

With the growing threat landscape in cyber space, how Essar has been managing to protect their business sensitive data? While the threat landscape has been...

INDUSTRY INPUTS

Significance of Trust in Information Technology

In this brief article, Ticky Thakkar explains the significance of trust in various technologies with respect to security. Trust is defined as “a firm belief...

OPINION Patches, Data and Patient Security

Security and medicine are increasingly intertwined, especially in today's highly regulated world where more people care for privacy and data protection. However, with companies...

Confronting The Automotive Cyber Threat

The first 10 weeks of 2018 have already produced a wide and sophisticated range of automotive hacks for some of the world’s leading brands. As...